141 |
I just need some space! space, invasion, and gender relations in restoration drama /Sikkink, Lisa Mae. January 2009 (has links) (PDF)
Thesis (M.A. in English)--Washington State University, May 2009. / Title from PDF title page (viewed on May 21, 2009). "Department of English." Includes bibliographical references (p. 60-62).
|
142 |
The correlation between the social desirability and endorsement rate of test items on the SNAP and NEO-FFIPedregón, Cynthia Anita. January 2008 (has links)
Thesis (M.A.)--University of Texas at El Paso, 2008. / Title from title screen. Vita. CD-ROM. Includes bibliographical references. Also available online.
|
143 |
Network-centric strategic-level deception /Erdie, Philip B. January 2004 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): James Bret Michael, Raymond Buettner. Includes bibliographical references (p. 33-34). Also available online.
|
144 |
Someone to watch overMontgomery, Mark. January 2008 (has links)
Thesis (Ph. D.)--State University of New York at Binghamton, Department of English, General Literature, And Rhetoric, 2008.
|
145 |
I [heart] U attachment style and gender as predictors of deception in online and offline dating /Zimbler, Mattitiyahu S., January 2009 (has links)
Thesis (M.S.)--University of Massachusetts Amherst, 2009. / On title page, [heart] is represented by a graphic art symbol. Open access. Includes bibliographical references (p. 42-44).
|
146 |
The estate of mendacity an interpretation of Williams's most ambiguous character /Bowlen, Creed. January 2010 (has links)
Thesis (M.F.A.)--University of Central Florida, 2010. / Adviser: John Shafer. Includes bibliographical references (p. 131-132).
|
147 |
Can I Have a Robot Friend? / Kan en robot vara min vän?Tistelgren, Mathias January 2018 (has links)
The development of autonomous social robots is still in its infancy, but there is no reason tothink that it will not continue. In fact, the robotics industry is growing rapidly. Since this trendis showing no signs of abating it is relevant to ask what type of relations we can have withthese machines. Is it for example possible to be friends with them? In this thesis I argue that it is unlikely that we will ever be able to be friends with robots. To believe otherwise is to be deceived, a trap it is all too easy to fall into since the efforts put on making social robots as human-like as possible and to make the human-robot interaction as smooth as possible are huge. But robots are not always what they seem. For instance, the capacity to enter into a friendship of one’s own volition is a core requirement for a relationship to be termed friendship. We also have a duty to act morally towards our friends, to treat them with due respect. To be able to do this we need to have self-knowledge, a sense of ourselves as persons in our own right. We do not have robots who display these capacities today, nor is it a given that we ever will. / Utvecklingen av autonoma sociala robotar är ännu i sin linda men det finns ingen anledning att tro att den inte kommer att fortsätta. Faktum är att robotindustrin växer kraftigt. Då denna trend inte visar några tecken på att avta är det relevant att fråga sig vilket slags relation vi kan ha till dessa maskiner. Är det t.ex. möjligt att bli vän med dem? I denna uppsats argumenterar jag för att det inte är troligt att vi någonsin kommer att kunna utveckla vänskap med en robot. Att tro något annat är en villfarelse, en fälla det är alltför lätt att falla i inte minst på grund av den möda som läggs ned på att göra robotarna så människoliknande som möjligt och robot-människa-interaktionen så smidig som möjligt. Men robotarna är inte alltid vad de verkar vara. Exempelvis är förmågan att kunna inleda ett vänskapsförhållande på eget bevåg engrundförutsättning för att relationen ska kunna klassas som vänskap. Vi har också en plikt att handla moraliskt gentemot våra vänner, att behandla dem med respekt. För att kunna göra detta måste vi ha självkännedom, en uppfattning om oss själva som personer i vår egen rätt. Robotar har inte dessa förmågor idag, och det är inte säkert att de någonsin kommer att besitta dem.
|
148 |
Active offensive cyber situational awareness : theory and practiceAl-Shamisi, Ahmed January 2014 (has links)
There is an increasing gap between the progress of technological systems and the successful exploitation of these systems through cyber-attack. Whilst the mechanism and scope of cyberspace is progressing with each passing day, risk factors and the ability to process the required amount of data from cyberspace efficiently are proving to be major obstacles to achieving desired outcomes from cyber operations. This, coupled with the dramatic increase in the numbers of cyber attackers, who are constantly producing new ways of attacking and paralysing cyber systems for political or financial gain, is a critical issue for countries that have linked their major infrastructures with Internet applications. The defensive methods currently applied to counter these evolving attacks are no longer sufficient, due to their preventive and reactive nature. This research has developed a new Active Situational Awareness theoretical model for Active Defence that aims to enhance the agility and quality of cyber situational awareness in organisations in order to counter cyber attacks. Situational Awareness (SA) is a crucial component in every organisation. It helps in the assessment of an immediate situation in relation to the environment. Current SA models adopt a reactive attitude, which responds to events and works in passive manner to any progressing enemy cyber attack. This creates a defensive mind-set and consequently influences the operator to process and utilise knowledge only within the concept of attack prevention. Thus, one can assume that operators will only gather certain knowledge after the occurrence of an attack, instead of actively searching for new intelligence to create new knowledge about the cyber attack before it takes place. This research study introduces a new approach that incorporates an Active Defence posture; namely, a ‘winning attitude’ that conforms to the military stratagems of Sun Tzu, where operators always engage attackers directly in order to create new knowledge in an agile manner by deploying active intelligence-gathering techniques to inform active defence postures in cyberspace. This also allows the system being protected to remain one step ahead of the attackers to ultimately defeat them and thwart any costly attacks. To back these statements, this study issued a survey to 200 cyber defence and security experts in order to collect data on their opinions concerning the current state of Active SA. Structural Equation Modelling (SEM) was then employed to analyse the data gathered from the survey. The results of the analysis revealed significant importance of Active Offensive Intelligence gathering in enhancing Cyber SA. The SEM showed there is a significant impact on SA Agility and Quality from Active Intelligence gathering activities. Further to this, the SEM results informed the design of the serious gaming environments utilised in this research to verify the SEM causality model. Also, the SEM informed the design of a SA assessment metric, where a behavioural anchor rating scale was used along with ground truth to measure participant SA performance. The results of this experiment revealed that there was 2 times better enhancement in cyber Situational awareness among those who did utilise active measures compared with participants who did not which mean almost double and this shows the importance of offensive intelligence gathering in enhancing cyber SA and speed up defender decision making and OODA loop. This research provided for the first time a novel theory for active cyber SA that is aligned with military doctrine. Also, a novel assessment framework and approaches for evaluating and quantifying cyber SA performance was developed in this research study. Finally, a serious gaming environment was developed for this research and used to evaluate the active SA theory which has an impact on training, techniques and practice Deception utilisation by Active groups revealed the importance of having deception capabilities as part of active tools that help operators to understand attackers’ intent and motive, and give operators more time to control the impact of cyber attacks. However, incorrect utilisation of deception capabilities during the experiment led operators to lose control over cyber attacks. Active defence is required for future cyber security. However, this trend towards the militarisation of cyberspace demands new or updated laws and regulations at an international level. Active intelligence methods define the principal capability at the core of the new active situational awareness model order in to deliver enhanced agility and quality in cyber SA.
|
149 |
Errat hic aliquis dolus. Tromperie et dissimulation dans les tragédies de Sénèque / Errat hic aliquis dolus. Deception and dissimulation in Seneca’s tragedies / Errat hic aliquis dolus. Inganni e finzioni nel teatro senecanoMichelon, Francesca 08 February 2011 (has links)
Ce travail est consacré à l’analyse des scènes de tromperie et de dissimulation dans le corpus tragique de Sénèque. La première section propose une analyse du vocabulaire que les auteurs tragiques ont utilisé, ainsi qu’une étude consacrée à la structure des moments de tromperie et de dissimulation, étude isolant les personnages, les passages scéniques, l’organisation et les modalités. Pour commencer, nous avons étudié les textes d’Ennius, Pacuvius et Accius, où nous avons cherché des références plus ou moins explicites au thème de la tromperie et de la dissimulation. Nous avons donc poursuivi notre analyse avec les textes de Sénèque pour lesquels nous avons classé le vocabulaire, les personnages et les loci dramatiques. Dans la deuxième partie du travail nous nous sommes intéressés à la scénographie des drames, le regnum d’un côté, le paysage naturel de l’autre. Pour le regnum, nous avons approfondi le lien entre pouvoir et dissimulation, thème qui s’insère dans la réflexion de Sénèque, aussi dans les Dialogues et les Epîtres. La représentation du paysage naturel fait ressortir le lien qui unit les personnages et leurs vicissitudes à l’espace que les entoure. / This study is dedicated to the analysis of deception and pretence in Seneca’s tragic corpus.The first section is dedicated to the terminology of deception and to its morphology; we propose an analysis of the vocabularies used by the various dramatists together with a study focused on the structure of deceptive moments, to isolate characters, scenic landscapes, organization and modalities. We started from the texts of Ennius, Pacuvius and Accius, in order to find references to the themes of deception and pretence. We moved to the analysis of Seneca’s tragedies to highlight both the lexical choices of the author and the features used to build up the fraudulent actions; on these themes, the study goes on with a classification of the terminology, of the characters and of the dramatic loci. The second section of the thesis is focused on the dramatic scenography, the regnum and the natural environment. In the first case, we aim at investigating the relationship between dissimulation and power, which is really important also in Seneca’s Dialogi et Epistulae, Also focusing on the natural environment, centre of Phaedra and Thyestes, we can notice the close link between the characters, their stories and the place they use.
|
150 |
Contributions of honeyports to network securityPepakayala, Sagar January 2007 (has links)
A honeypot is an attractive computer target placed inside a network to lure the attackers into it. There are many advantages of this technology, like, information about attacker's tools and techniques can be fingerprinted, malicious traffic can be diverted away from the real target etc. With the increased activity from the blackhat community day by day, honeypots could be an effective weapon in the network security administrator's armor. They have been studied rigorously during the past few years as a part of the security industry's drive to combat malicious traffic. While the whitehats are trying to make honeypots stealthier, blackhats are coming up with techniques to identify them (therefore nullifying any further use) or worse, use them in their favor. The game is on. The goal of this thesis is to study different architectural issues regarding honeypot deployment, various stages in utilizing honeypots like forensic analysis etc. Other concepts like IDSs and firewalls which are used in conjunction with honeypots are also discussed, because security is about cooperation among different security components. In the security industry, it is customary for whitehats to watch what blackhats are doing and vice versa. So the thesis discusses recent techniques to defeat honeypots and risks involved in deploying honeypots. Commercial viability of honeypots and business cases for outsourcing honeypot maintenance are presented. A great interest from the security community about honeypots has propelled the research and resulted in various new and innovative applications of honeypots. Some of these applications, which made an impact, are discussed. Finally, future directions in research in honeypot technology are perused.
|
Page generated in 0.0604 seconds